Author URLs
Document Type
Article
Publication Date
11-2014
Subject: LCSH
Railoads, Business logistics
Disciplines
Industrial Engineering | Mechanical Engineering
Abstract
In this paper, we present a two-stage mixed integer programming (MIP) interdiction model in which an interdictor chooses a limited amount of elements to attack first on a given network, and then an operator dispatches trains through the residual network. Our MIP model explicitly incorporates discrete unit flows of trains on the rail network with time-variant capacities. A real coal rail transportation network is used in order to generate scenarios to provide tactical and operational level vulnerability assessment analysis including rerouting decisions, travel and delay costs analysis, and the frequency of interdictions of facilities for the dynamic rail system.
DOI
10.1016/j.tre.2014.06.017
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Repository Citation
Gedik, Ridvan; Medal, Hugh; Rainwater, Chase; Pohl, Edward A.; and Mason, Scott J., "Vulnerability Assessment and Re-routing of Freight Trains Under Disruptions: A Coal Supply Chain Network Application" (2014). Mechanical and Industrial Engineering Faculty Publications. 27.
https://digitalcommons.newhaven.edu/mechanicalengineering-facpubs/27
Publisher Citation
Gedik, R., Medal, H., Rainwater, C., Pohl, E. A., & Mason, S. J. (2014). Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application. Transportation Research Part E: Logistics and Transportation Review, 71, 45-57.
Comments
This is the authors' accepted version of the article published in Transportation Research Part E: Logistics and Transportation Review. The version of record appears at http://dx.doi.org/10.1016/j.tre.2014.06.017